Threat Advisory

Critical Argo CD Vulnerability Exfiltrates Kubernetes Secrets

Threat: Vulnerability
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: Critical
[subscribe_to_unlock_form]


EXECUTIVE SUMMARY:

CVE-2026-43824 with a CVSS score of 9.6 is a critical vulnerability in Argo CD's ServerSideDiff endpoint that allows low-privileged users to extract plaintext Kubernetes Secrets directly from a cluster. The vulnerability exists due to a missing authorization and data-masking gap within the ServerSideDiff handler, which bypasses built-in masking mechanisms and exposes sensitive cluster data, including service account tokens, database passwords, TLS certificates, and third-party API keys. An attacker can exploit this flaw by obtaining basic read-only access to the system, which is achievable because of the default catch-all policy for authenticated Argo CD users. By triggering the ServerSideDiff function on a targeted managed resource, attackers can extract highly sensitive operational data without authorization. Successful exploitation may compromise the security of the GitOps pipeline and lead to severe business impacts, including unauthorized access to sensitive systems, data breaches, and disruption of operational integrity. The vulnerability requires no special prerequisites beyond basic read-only access, making immediate remediation and security review essential for affected environments.[/subscribe_to_unlock_form]


EXECUTIVE SUMMARY:

CVE-2026-43824 with a CVSS score of 9.6 is a critical vulnerability in Argo CD's ServerSideDiff endpoint that allows low-privileged users to extract plaintext Kubernetes Secrets directly from a cluster. The vulnerability exists due to a missing authorization and data-masking gap within the ServerSideDiff handler, which bypasses built-in masking mechanisms and exposes sensitive cluster data, including service account tokens, database passwords, TLS certificates, and third-party API keys. An attacker can exploit this flaw by obtaining basic read-only access to the system, which is achievable because of the default catch-all policy for authenticated Argo CD users. By triggering the ServerSideDiff function on a targeted managed resource, attackers can extract highly sensitive operational data without authorization. Successful exploitation may compromise the security of the GitOps pipeline and lead to severe business impacts, including unauthorized access to sensitive systems, data breaches, and disruption of operational integrity. The vulnerability requires no special prerequisites beyond basic read-only access, making immediate remediation and security review essential for affected environments.[emaillocker id="1283"]

RECOMMENDATION:

We strongly recommend you update argo-cd to below version: https://github.com/argoproj/argo-cd/releases

REFERENCES:

The following reports contain further technical details:
https://cybersecuritynews.com/argo-cds-serversidediff-vulnerability/

[/emaillocker]
crossmenu